cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

Hacker Videos

🗞 News t.me/PentestingNews 💲 Donate Bitcoin 1EsB5trfvRaSPfWmh1DSA5aggmo1NsytB3

Mostrar más
Publicaciones publicitarias
527
Suscriptores
-124 horas
Sin datos7 días
+2730 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

Mostrar todo...
Indirect Prompt Injection

👩‍🎓👨‍🎓 Learn about Large Language Model (LLM) attacks! This lab is vulnerable to indirect prompt injection. The user carlos frequently uses the live chat to ask about the Lightweight "l33t" Leather Jacket product. To solve the lab, we must delete the user carlos. If you're struggling with the concepts covered in this lab, please review

https://portswigger.net/web-security/llm-attacks

🧠 🔗 Portswigger challenge:

https://portswigger.net/web-security/llm-attacks/lab-indirect-prompt-injection

🧑💻 Sign up and start hacking right now -

https://go.intigriti.com/register

👾 Join our Discord -

https://go.intigriti.com/discord

🎙️ This show is hosted by

https://twitter.com/_CryptoCat

( @_CryptoCat ) &

https://twitter.com/intigriti

👕 Do you want some Intigriti Swag? Check out

https://swag.intigriti.com

Overview: 0:00 Intro 0:20 Insecure output handling 0:52 Indirect prompt injection 2:20 Lab: Indirect prompt injection 3:05 Explore site functionality 3:42 Probe LLM chatbot 4:29 Launch attacks via review feature 11:00 Conclusion

Mostrar todo...
AI is Taking Our Jobs

Check out Snyk's AI hacking workshop on July 25th. Register here to secure a spot: snyk.co/livehacktcm Sponsor a Video:

https://www.tcm.rocks/Sponsors

Pentests & Security Consulting:

https://tcm-sec.com

Get Trained:

https://academy.tcm-sec.com

Get Certified:

https://certifications.tcm-sec.com

Merch:

https://merch.tcm-sec.com

📱Social Media📱 ___________________________________________ Twitter:

https://twitter.com/thecybermentor

Twitch:

https://www.twitch.tv/thecybermentor

Instagram:

https://instagram.com/thecybermentor

LinkedIn:

https://www.linkedin.com/in/heathadams

TikTok:

https://tiktok.com/@thecybermentor

Discord:

https://discord.gg/tcm

💸Donate💸 ___________________________________________ Like the channel? Please consider supporting me on Patreon:

https://www.patreon.com/thecybermentor

Support the stream (one-time):

https://streamlabs.com/thecybermentor

Hacker Books: Penetration Testing: A Hands-On Introduction to Hacking:

https://amzn.to/31GN7iX

The Hacker Playbook 3:

https://amzn.to/34XkIY2

Hacking: The Art of Exploitation:

https://amzn.to/2VchDyL

The Web Application Hacker's Handbook:

https://amzn.to/30Fj21S

Real-World Bug Hunting: A Field Guide to Web Hacking:

https://amzn.to/2V9srOe

Social Engineering: The Science of Human Hacking:

https://amzn.to/31HAmVx

Linux Basics for Hackers:

https://amzn.to/34WvcXP

Python Crash Course, 2nd Edition:

https://amzn.to/30gINu0

Violent Python:

https://amzn.to/2QoGoJn

Black Hat Python:

https://amzn.to/2V9GpQk

My Build: lg 32gk850g-b 32" Gaming Monitor:

https://amzn.to/30C0qzV

darkFlash Phantom Black ATX Mid-Tower Case:

https://amzn.to/30d1UW1

EVGA 2080TI:

https://amzn.to/30d2lj7

MSI Z390 MotherBoard:

https://amzn.to/30eu5TL

Intel 9700K:

https://amzn.to/2M7hM2p

G.SKILL 32GB DDR4 RAM:

https://amzn.to/2M638Zb

Razer Nommo Chroma Speakers:

https://amzn.to/30bWjiK

Razer BlackWidow Chroma Keyboard:

https://amzn.to/2V7A0or

CORSAIR Pro RBG Gaming Mouse:

https://amzn.to/30hvg4P

Sennheiser RS 175 RF Wireless Headphones:

https://amzn.to/31MOgpu

My Recording Equipment: Panasonic G85 4K Camera:

https://amzn.to/2Mk9vsf

Logitech C922x Pro Webcam:

https://amzn.to/2LIRxAp

Aston Origin Microphone:

https://amzn.to/2LFtNNE

Rode VideoMicro:

https://amzn.to/309yLKH

Mackie PROFX8V2 Mixer:

https://amzn.to/31HKOMB

Elgato Cam Link 4K:

https://amzn.to/2QlicYx

Elgate Stream Deck:

https://amzn.to/2OlchA5

*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

F4 maps 3D data explorer - go check it out! #mapping #3d https://www.youtube.com/watch?v=_l2dtuxlwIQ
Mostrar todo...

Do you know how to push a Docker container to Docker Hub? #shorts #docker #container https://www.youtube.com/watch?v=se0Cv-bAsP4
Mostrar todo...
Do you know how to push a Docker container to Docker Hub? #shorts #docker #container

Hacking Windows TrustedInstaller (GOD MODE) https://www.youtube.com/watch?v=Vj1uh89v-Sc
Mostrar todo...
Hacking Windows TrustedInstaller (GOD MODE)

https://jh.live/pwyc

|| Jump into Pay What You Can training at whatever cost makes sense for you!

https://jh.live/pwyc

Learn Cybersecurity - Name Your Price Training with John Hammond:

https://nameyourpricetraining.com

Learn Coding:

https://jh.live/codecrafters

WATCH MORE: Dark Web & Cybercrime Investigations:

https://www.youtube.com/watch?v=_GD5mPN_URM&list=PL1H1sBF1VAKVmjZZr162aUNCt2Uy5ozAG&index=4

Malware & Hacker Tradecraft:

https://www.youtube.com/watch?v=LKR8cdfKeGw&list=PL1H1sBF1VAKWMn_3QPddayIypbbITTGZv&index=5

📧JOIN MY NEWSLETTER ➡

https://jh.live/email

🙏SUPPORT THE CHANNEL ➡

https://jh.live/patreon

🤝 SPONSOR THE CHANNEL ➡

https://jh.live/sponsor

🌎FOLLOW ME EVERYWHERE ➡

https://jh.live/twitter

https://jh.live/linkedin

https://jh.live/discord

https://jh.live/instagram

https://jh.live/tiktok

💥 SEND ME MALWARE ➡

https://jh.live/malware

🔥YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe!

Mounting Linux Disk Images in Windows https://www.youtube.com/watch?v=W_youhia4dU
Mostrar todo...
Mounting Linux Disk Images in Windows

Learn how to mount Linux disk images in Windows using the Windows Subsystem for Linux (WSL). We’ll tackle common issues and their fixes. ⌨️ Command used in the video: sudo mount -o ro,loop,offset=[OFFSET],noload [IMAGE] /mnt/[MOUNTPOINT] If you're mounting images containing Logical Volume Management (LVM) volumes, additional steps are required: ✅ Create a loop device from the disk image: sudo losetup -f -P testimage.dd Here, "-f" tells losetup to find the next available loop device, and "-P" forces the kernel to scan the partition table on the newly created loop device. ✅ Refresh LVM so that the new device appears: sudo pvscan --cache This command clears all existing physical volume online records first, then scans all devices on the system, adding physical volume online records for any physical volumes that are found. ✅ Activate the new volume group and logical volumes: sudo vgchange -ay This command activates all inactive logical volumes in the volume group. "ay" stands for "activate yes." ✅ Locate the new volume group: sudo vgdisplay ✅ Mount the volume group: sudo mount /dev/mapper/[VOLUME_GROUP]--[LOGICAL_VOLUME] /mnt/image Note: Replace [VOLUME_GROUP]--[LOGICAL_VOLUME] with the actual paths derived from the sudo vgdisplay command. 📃 Please reference this article for more information:

https://rich.grundy.io/blog/mounting-lvm-raw-disk-image-on-linux/

*** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 05:09 - The Solution #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics #LinuxForensics

Stop Wasting Time! Master Freelancing in Cybersecurity Now https://www.youtube.com/watch?v=ScSsXBz6D78
Mostrar todo...

How to be Invisible Online using Expert OSINT techniques https://www.youtube.com/watch?v=QzmWzslT6QM
Mostrar todo...
How to be Invisible Online using Expert OSINT techniques

Big shoutout to KASM for sponsoring this video. KASM workspaces supports the OSINT Community Efforts by providing the following products: Kasm Community Edition:

https://kasmweb.com/community-edition

Kasm Cloud OSINT:

https://kasmweb.com/cloud-personal

Kasm Workspaces OSINT Platform for Professionals/:

https://kasmweb.com/osint

Kasm Infrastructure/Apps for OSINT Collection:

https://registry.kasmweb.com/1.0/

// MJ Banias’ SOCIALS // LinkedIn:

https://www.linkedin.com/in/mjbanias

Cloak and Dagger Podcast (Spotify):

https://open.spotify.com/show/6mT8zDMBq5gOfAVZi47pT3

The Debrief:

https://thedebrief.org/podcasts/

Instagram:

https://www.instagram.com/mjbanias/

X:

https://x.com/mjbanias

Website:

https://www.bullshithunting.com/

// Ritu Gill’ SOCIALS // LinkedIn:

https://www.linkedin.com/in/ritugill-osinttechniques/

OSINT Techniques website:

https://www.osinttechniques.com/

Instagram:

https://www.osinttechniques.com/

X:

https://x.com/osinttechniques

YouTube:

https://www.youtube.com/@ForensicOSINT

Forensic OSINT website:

https://www.forensicosint.com/

TikTok:

https://www.tiktok.com/@osint.techniques

// Rae Baker’s SOCIALS // Website:

https://www.raebaker.net/

LinkedIn: linkedin.com/in/raebakerosint X:

https://x.com/wondersmith_rae

// Eliot Higgins’ SOCIALS // Bellingcat website:

https://www.bellingcat.com/author/eliothiggins/

X:

https://x.com/eliothiggins

// Books // The UFO People: A Curious Culture by MJ Banias: USA:

https://amzn.to/3xP5Jme

UK:

https://amzn.to/4cOrzoK

Deep Dive: Exploring the Real-world Value of Open Source Intelligence by Rae Baker and Micah Hoffman: USA:

https://amzn.to/3xFN9gv

UK:

https://amzn.to/3zJSy6z

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News by Eliot Higgins: USA:

https://amzn.to/3RXNa64

UK:

https://amzn.to/4cvYP4B

// YouTube video REFERENCE // Top 10 FREE OSINT tools (with demos):

https://youtu.be/PRqOj5qM1ic

Deep Dive OSINT:

https://youtu.be/dxiNByvkvU8

Best Hacking Python Book:

https://youtu.be/2B76CTbi72w

She Hacked Me:

https://youtu.be/U6pDqFhN82I

// David's SOCIAL // Discord:

https://discord.com/invite/usKSyzb

X:

https://www.twitter.com/davidbombal

Instagram:

https://www.instagram.com/davidbombal

LinkedIn:

https://www.linkedin.com/in/davidbombal

Facebook:

https://www.facebook.com/davidbombal.co

TikTok: http://tiktok.com/@davidbombal YouTube:

https://www.youtube.com/@davidbombal

// MY STUFF //

https://www.amazon.com/shop/davidbombal

// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] // MENU // 00:00 - Coming up 00:41 - Sponsored Section: KASM Workspaces demo 06:26 - Intro 06:46 - MJ’s Journey in OSINT 11:14 - Starting an OSINT Company 11:55 - Teaching Background 12:34 - Years in OSINT 13:19 - Advice for People Starting Out 15:44 - What It Means to Do OSINT 16:54 - Recommended Tools for OSINT 19:03 - Meet Ritu Gil 19:09 - Characteristics of a Good OSINT Investigator 20:03 - Knowing When to Give Up 20:43 - Soft Skills vs Technical Skills 22:17 - Ritu’s Advice on How to Get Started 23:24 - Are There Jobs in OSINT? 24:39 - Forensic OSINT Demo 26:41 - Tinder Vulnerabilities 30:51 - Next Guest Intro 32:04 - Rae Baker 32:33 - Tools Rae Uses 34:11 - From Graphic Design to OSINT 37:56 - Volunteering to Learn 39:10 - Next Guest Intro 40:10 - Eliot Higgins 40:19 - Eliot’s Background into OSINT 41:44 - Bellingcat 44:27 - No Degree Needed to Start 45:37 - Useful Tools to Use 47:19 - Advice for People Starting Out 48:36 - Communities to Join 51:50 - Recommended Books 53:03 - How MJ Got the Job 55:53 - MJ Shares an OSINT Story 01:02:44 - Importance of a Team 01:08:15 - Conclusion 01:10:34 - Outro osint open-source intelligence open source intelligence tools osint curious geolocation geolocation game facebook instagram google bing yandex geolocation google geolocation bing you cannot hide social media warning about social media google dorks dorks google osintgram osint framework osint tools osint tv osint ukraine osint tutorial osint course osint instagram osint framework…

HackTheBox - Corporate (FIXED) https://www.youtube.com/watch?v=R7mkgYcFcZ0
Mostrar todo...
HackTheBox - Corporate (FIXED)

Sorry for the double upload. The last 45 seconds were missing from the first video. 00:00 - Introduction 01:00 - Start of nmap 02:45 - Playing with the Agent Chat, discovering we can send HTML then testing for XSS then seeing CSP (Content Security Policy) Stops us 06:20 - Testing for the ability to perform redirection via HTML via meta refresh 09:20 - Discovering the 404 error page has reflective XSS, but CSP Blocks us from running XSS on the page itself 10:15 - Finding one of the Analytics JavaScript Files allows for reflective injection, allowing us to insert javascript 13:00 - Having a Meta Redirect to the double reflective xss injection and stealing a cookie 22:10 - Logged into the SSO by replaying the cookie and testing password reset 29:00 - Getting a second session so we can test the file-sharing capability 37:10 - Creating a script that will enumerate users based upon the people directory, then test the welcome password 56:30 - Going over the internal nmap scan from the VPN 1:03:54 - Looking at the Mozilla directory, discovering there is a BitWarden plugin installed and the history indicates they may have a pin code set 1:11:00 - Extracting the Bitwarden PinProtected Hash so we can crack it 1:31:30 - Downloading all the Git Repo's and finding a secret in the commit history and discovering they JWT Signing Key 1:37:00 - Using GetEnt on the Linux workstation to enumerate groups in ldap 1:42:50 - Creating a JWT of the Engineering group, changing the password then logging into the workstation 1:45:30 - Downloading a Docker Image from our box, and copying it to the remote host so we can use Docker to Privesc 1:49:10 - As root we can SU to other users, then find an SSH Key for Sysadmin to the main host 1:55:55 - Proxmox backups on the mainhost have the authkey.key file which is the RSA Signing Key Proxmox uses for cookies 1:58:30 - Creating a proxmox cookie with the RSA Signing Key and then using the API to change the root password

Elige un Plan Diferente

Tu plan actual sólo permite el análisis de 5 canales. Para obtener más, elige otro plan.